17.06.2013 Views

Beginning Microsoft SQL Server 2008 ... - S3 Tech Training

Beginning Microsoft SQL Server 2008 ... - S3 Tech Training

Beginning Microsoft SQL Server 2008 ... - S3 Tech Training

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Authentication<br />

Chapter 2: Tools of the Trade<br />

Watch out when using the <strong>Server</strong> selection dialog box. Although it’s usually pretty<br />

reliable, there are ways of configuring a <strong>SQL</strong> <strong>Server</strong> so that it doesn’t broadcast. When<br />

a server has been configured this way, it won’t show up in the list. Also, servers that<br />

are only listening on the TCP/IP NetLib and don’t have a DNS entry will not show<br />

up. You must, in this case, already know your IP address and refer to the server<br />

using it.<br />

You can choose between Windows Authentication and <strong>SQL</strong> <strong>Server</strong> Authentication. Windows Authentication<br />

will always be available, even if you configured it as <strong>SQL</strong> <strong>Server</strong> Authentication. Logins using usernames<br />

and passwords that are local to <strong>SQL</strong> <strong>Server</strong> (not part of a larger Windows network) are acceptable<br />

to the system only if you specifically turn on <strong>SQL</strong> <strong>Server</strong> Authentication.<br />

Windows Authentication<br />

Windows Authentication is just as it sounds. You have Windows users and groups. Those Windows users<br />

are mapped into <strong>SQL</strong> <strong>Server</strong> logins in their Windows user profile. When they attempt to log in to <strong>SQL</strong><br />

<strong>Server</strong>, they are validated through the Windows domain and mapped to roles according to the login.<br />

These roles identify what the user is allowed to do.<br />

The best part of this model is that you have only one password. (If you change it in the Windows domain,<br />

then it’s changed for your <strong>SQL</strong> <strong>Server</strong> logins, too.) You don’t have to fill in anything to log in; it just takes<br />

the login information from the way you’re currently logged in to the Windows network. Additionally, the<br />

administrator has to administer users in only one place. The downside is that mapping this process can<br />

get complex and, to administer the Windows user side of things, you must be a domain administrator.<br />

<strong>SQL</strong> <strong>Server</strong> Authentication<br />

The security does not care at all about what the user’s rights to the network are, but rather what you<br />

explicitly set up in <strong>SQL</strong> <strong>Server</strong>. The authentication process doesn’t take into account the current network<br />

login at all; instead, the user provides a <strong>SQL</strong> <strong>Server</strong>–specific login and password.<br />

This can be nice because the administrator for a given <strong>SQL</strong> <strong>Server</strong> doesn’t need to be a domain administrator<br />

(or even have a username on your network, for that matter) to give rights to users on the <strong>SQL</strong> <strong>Server</strong>.<br />

The process also tends to be somewhat simpler than under Windows Authentication. Finally, it means<br />

that one user can have multiple logins that give different rights to different things.<br />

Try It Out Making the Connection<br />

Let’s get logged in.<br />

1. Choose the (local) option for the <strong>SQL</strong> <strong>Server</strong>.<br />

2. Select <strong>SQL</strong> <strong>Server</strong> Authentication.<br />

31

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!